Tuesday, February 9, 2016

CIS 438 WEEK 5 MIDTERM


BUY HERE




CIS 438 Week 5 Midterm
1.     The Gramm-Leach-Bliley Act requires financial institutions to protect consumer financial information by complying with which of the following?
2.     Which of the following must be protected per PCI DSS requirements?
3.     All of the following are examples of consumer financial information except:
4.     Which of the following statements does not apply to credit unions?
5.     The Federal Reserve reports directly to:
6.     The ________________________ is also known as the Financial Services Modernization Act of 1999.
7.     The _____________________ established the national banking system in the United States.
8.     HIPAA's _____________________ provisions are designed to encourage "the development of a health information system through the establishment of standards and requirements for the electronic transmission of certain health information."
9.     Which of the following is not true about the Consolidated Omnibus Budget Reconciliation Act of 1986?
10.   ____________________ forbids a new employer's health plan from denying health coverage for some reasons and prohibits discrimination against workers based on certain conditions such as pregnancy.
11.   Before ____________________, many workers experienced "job lock" and were afraid that they would lose health care benefits if they changed jobs.
12.   The state with some of the strictest patient privacy protections is:
13.   COBRA benefits generally last a maximum of:
14.   As defined by HIPAA, the term "covered entities" means:
15.   All of the following are true statements about the American legal system except:
16.   Which of the following is not a true statement?
17.   Which of the following is a true statement about the Court of Appeals?
18.   The ___________________ branch has the lawmaking authority of the federal government.
19.   The role of the U.S. Cabinet is to:
20.   Civil law provides for the:
21.   _______________ governs the prosecution of those charged with serious offenses against public order, such as murder.
22.   _____________________ are tools that filter offensive content.
23.   Which of the following is not a condition of "obscenity" as defined by the U.S. Supreme Court?
24.   The _________________ requires schools to protect students' records.
25.   Some people believe that COPPA requirements violate freedom of speech without censorship guaranteed by the ______________ Amendment.
26.   The ________________________ protects the information of children online.
27.   Under FERPA, which of the following may be disclosed in a school directory without consent?
28.   The main goal of ______________ is to protect shareholders and investors from financial fraud.
29.   Which financial disclosure form helps investors understand the financial stability of a company?
30.   SOX ___________imposes criminal liability for fraudulent financial certifications.
31.   The Enron scandal and similar corporate scandals led to the creation of which of the following?
32.   SOX ______ requires a company's executive management to report on the effectiveness of the company's internal controls over financial reporting (ICFR).
33.   The U.S. Securities and Exchange Commission reviews a public company's Form 10-K at least once every ____________ years.
34.   All of the following are types of information included on a Form 10-K except:
35.   A ____________________ is owned by many investors in the form of stock.
36.   __________________ is a body of law developed because of legal tradition and court cases.
37.   The first state to enact anti-spyware legislation was:
38.   Types of information that most people consider private include:
39.   What is a small string of text that a Web site stores on a user's computer?
40.   Which of the following is a true statement regarding privacy?
41.   Which of the following U.S. Constitution amendments contribute to the right of privacy?
42.   What is the source of legal authority for the U.S. government?
43.   What is considered personally identifiable information?
44.   ______________ means that only people with the right permission can access and use information.
45.   Organizations have a number of options for responding to risk. Common responses include which of the following?
46.   Anything that can cause harm to an information system is a:
47.   The likelihood that a threat will exploit a vulnerability and cause harm is called:
48.   What is the window of vulnerability?
49.   The main goal of information security is to protect:
50.   _______________ is the process of reviewing known vulnerabilities and threats.







                     

No comments:

Post a Comment